Preserving Trajectory Privacy in Participatory Sensing Applications

Share Embed


Descrição do Produto

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 5, May 2015

Preserving Trajectory Privacy in Participatory Sensing Applications Gauri R Virkar

Sanchika A Bajpai

Department Of Computer Engineering BSIOER, Wagholi Pune, India

Department Of Computer Engineering BSIOER, Wagholi Pune, India

object which is generally represented by (x, y, t) where x and y are the location coordinates and t denotes the timestamp. In typical participatory sensing applications, the data reports generated as an output may reveal participators’ spatial temporal information. Adversary can obtain some valuable results from the published trajectories. The collected data may be used to deduce private information about the user. So to ensure the participators’ privacy is the most urgent task. The gathered information is very crucial to the participatory sensing systems as their deficiency endangers the success of such systems. Therefore the need is to preserve the privacy of the participatory sensing users by protecting their trajectories.

Abstract— With the advancement of technology in fields of wireless communication, different mobile communicating devices equipped with variety of embedded sensors and powerful sensing have been emerged. Participatory sensing is the process that enables individuals to collect, analyze and share local knowledge with their own mobile devices. Although the use of participatory sensing offers numerous benefits on deployment costs, availability, spatial- temporal coverage, energy consumption and so forth, it has certain threats which may be compromise the participator’s location and their trajectory data. Henceforth, to ensure the participators’ privacy is the most urgent task. The existing proposals emphasized more on participators’ location privacy and very few of them consider the privacy of the trajectories. The theoretical mix zones model are been improved by considering time factor from the viewpoint of the graph theory and mix zone graph model has been presented. This model considers only sensitive trajectories for providing privacy thereby reducing overall information loss and storage space. Further, instead of defining single mix zone graph model, multiple mix zones are created in order to enhance the privacy of the participator’s trajectories.

Mix Zone Graph Model [2] is one of the existing approach for providing privacy to the trajectories of the participators. A mix zone is a region where no applications can track user movements. It is the region where the users can change their pseudonyms without being observed by the adversaries. A pseudonym is a uniquely generated random number. Each participator enters a mix zone with a pseudonym and exits the mix zone with other pseudonym. The use of pseudonym breaks the continuity of a user’s location exposure thereby protecting the future locations of the users. However, existing mix zone model solutions mainly focus on the development of single mix zone. Henceforth, for providing more security multiple locations are selected for applying mix zone graph model. Thus, multiple mix zone model [3] is used for providing maximal privacy to the trajectories of the participatory sensing users.

Keywords- Location privacy, mix zone graph model, multiple mix zone, participatory sensing, trajectories.

I.

INTRODUCTION

T

HE growth of mobile phones along with their pervasive connectivity leads to the development of a new sensing technology model called as participatory sensing[1] systems. Here mobile devices carried by the individual’s acts as a sensor thereby eliminating the need of deploying sensors at particular areas. Participatory Sensing facilitates the participator to sense, analyze, collect and share the sensed information from their surrounding environment using their mobile phones. For example mobile phones may report actual (continuously) temperature or sound level; likewise, vehicles may notify about traffic conditions.

A. Location Privacy Location privacy is defined as the ability to prevent other unauthorized parties from learning one’s current or past location. Traditionally, privacy of personal location information has not been a critical issue but, with the advancement of location tracking systems capable of following user movement twenty-four hours a day and seven days a week, location privacy becomes crucial: records of everything from the particular rack a person visit in the library to the clinics a person visit in a hospital can represent a very invasive list of data. Numerous systems could figure out the location of

The vast amount of trajectory data gets collected and progressively increases as the participators sense the data. Trajectories are defined as the path followed by the moving

83

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 5, May 2015

person. One of several original systems designed for position following could be the Global Positioning System (GPS). This technique makes use of satellites to aid devices figure out their own position. Generally, automated digital devices obtain information either through communication, observation, or inference.

E. Our Solution In this paper, we propose an approach for preserving trajectories of the participators by applying Mix Zone Graph Model at multiple locations thereby enhancing the privacy level of the participators. Further, due to cost constraints, not all point of interests can be considered as the candidates for applying Mix Zone Graph Model. So the solution for selection and placement problem of the number of mix zones to be considered is been addressed here.

B. Trajectory Privacy A trajectory is the path that a moving object follows through space as a function of time. Example of trajectories could be monitoring of wild animals, birds, people, a soccer player, etc. Trajectories may be uni-dimensional or perhaps multidimensional. Participatory sensing systems primarily depend on the collection of information across large geographic areas. The sensor data uploaded by participators are usually tagged with the spatial-temporal information when the readings were recorded the published trajectories for decision making. For example, merchants may possibly decide where to build a food store that could produce maximum gain by analyzing trajectories associated with consumers in a selected spot and also the Department of Transportation can make an optimized vehicle scheduling strategy by monitoring the trajectories connected with motor vehicles. However, it will add considerable threats to the participators’ privacy. Adversary may perhaps examine the particular trajectories which contain abundant spatial-temporal background information to be able to link numerous reports that are collected. Hence, it is crucial to be able to unlink the particular participators’ identities from sensitive data collection locations.

F. Our Contribution Our contribution in this paper is as follows: To secure location and trajectory privacy of the participatory sensing user by applying Mix Zone Graph Model.  To secure multiple sensitive locations of the participatory sensing user.  To prove that privacy of the user can be enhanced by protecting multiple sensitive locations instead of single sensitive location. The remainder of this paper is organized as follows. Section II discusses about the related work. In Section III, implementation details are provided. Section IV discusses about the result work. Finally, the paper is concluded and future work is been given in Section V. II.

C. Existing Technique Limitation TrPF, Trajectory Privacy Preserving Framework for Participatory Sensing Applications, is an existing approach which preserves the trajectories of the participators by applying Mix zone Graph Model at a single sensitive location. The problem here is that if an adversary is successful to guess the pseudonym of this single location Mix Zone Graph Model, the whole trajectory can be inferred.

RELATED WORK

In the literature there exist several approaches to protect the particular position of the user. Some of them are discussed belowA. Location Privacy Protection There are several works that analyze the location privacy preserving schemes. They can be classified into the following aspects. 1) Obfuscation: It is defined as the means of intentionally degrading the quality of information about an individual’s location in order to protect that individual’s location[4].

D. Our Observation Instead of applying Mix Zone Graph Model at single sensitive location, multiple locations can be considered as the candidates for applying Mix Zone Graph Model. As the number of locations increases, the number of pseudonyms to be cracked by an adversary increases. Thus the probability of successful attack by an adversary is reduced. An attack is said to be successful if an adversary is able to crack all the pseudonyms used in the corresponding mix zones. Consider a scenario where Mix Zone Graph Model is applied at three locations. The adversary will be able to deduce the whole trajectory only when he/she will be able to crack the pseudonyms at all three locations. Hence, as the number of mix zones increases the number of pseudonyms to be identified increases eventually increasing the privacy level.

2) Mix Networks: Mix Networks [4] uses anonymizing channels to de-link reports submitted by sensors before they reach the applications. In other words, Mix Networks act as proxies to forward user reports only when some systemdefined criteria are met. Mix Network may wait to receive k reports before forwarding them to the application, e.g., to guarantee k-anonymity. However, the anonymity level directly depends on the number of reports received and “mixed” by the Mix Network. They rely on statistical methods to protect privacy and do not guarantee provably-secure privacy. In addition, there could be situations where a moderately long

84

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 5, May 2015

time could pass before the desired level of anonymity is arrived at (when "enough" reports have been gathered). Accordingly, Mix Networks might strikingly diminish framework throughput and can't be utilized as a part of settings where regular reports are needed.

Some of the existing trajectory privacy protection schemes are as follows 1) Dummy Trajectory Obfuscation: Protecting trajectory privacy from a data publication viewpoint is performed with simple dummy trajectories obfuscation approach. This approach proposes to generate dummy trajectories so that you can confuse the adversaries. In order to confuse fake trajectories as well as the true ones, dummy trajectories are usually generated under two rules: first, the movement patterns of dummy trajectory needs to be similar to end users; second, the intersections of trajectories needs to be as more as possible. According to these rules, dummy trajectories are usually generated by rotating true users’ trajectories. But the main drawback is to generate similar looking trajectories as the quality of anonymity depends upon it.

3) K-Anonymity: k-anonymity is a wide-spread general privacy concept not limited to location privacy. It gives the assurance that in a set of k objects (in this case, mobile user) the target object is indistinguishable from the other k – 1 object. Subsequently, the likelihood to distinguish the target user is 1/k. The thought behind k-anonymity is that a user reports a obfuscation region to a customer containing his position and the positions of k – 1 different customers rather than his exact position that is secured by a pseudonym. As an example consider that Alice is currently at home and queries a location based service for the nearest cardiology facility. Without utilizing anonymization, this inquiry could reveal to the customer implementing the service that Alice has health issues. By utilizing k-anonymity, Alice would be indistinguishable from at least k – 1 different customer, such that the customer couldn't link the actual request to Alice. As a result, it is necessary that all k customers of the calculated anonymization set sent to the customer have the same obfuscation [4] region such that the customer can't connect the issued position to the home location of Alice.

2) Suppression-Based Method: It is based on the assumption that various adversaries may have diverse and disjoint part of users’ trajectories. Suppression-based method decreases the probability of exposing the whole trajectories. Trajectory pieces should be suppressed, publication of these pieces may raise the whole trajectory’s breach probability over a particular threshold. This technique works well by preventing the explosion of whole trajectories from the adversaries. But the main setback is that some useful data may get lost during suppression of trajectory data.

4) Mix-Zones: Pseudonym is used to break the actual linkage between the user’s identities with his/her events. This task is normally performed in most pre-determined areas known as mix zones. The task of the modify is normally performed in most pre-determined areas known as mix zones. A difficulty with this particular method is actually of which there must be adequate customers from mix zone to offer a acceptable level of anonymity.

3) Trajectory K-Anonymity: Trajectory k-anonymization [6] technique proposes a scheme where every trajectory is generated such that a user finds it indistinguishable to guess the other k-1 trajectories. In this approach first, trajectories are clustered based on log cost metric, then each sample location on trajectories is generalized to a region containing at least k moving objects. Then trajectories are reconstructed by arbitarily choosing sample points from the anonymized region.

5) Dummy Locations : This process mostly employs the idea of dummy locations[5] to protect the user’s location privacy. A location-dependent issue is actually abstracted as Q = (pos; P), where parameter pos is actually the mobile user location and also parameter P denotes the user specified predicates. We call such a query Q the original query. While using the location dummy strategy, the original problem is typically converted into a query Q0 = (pos1; pos2;:::; posk; P), where the pos1 include the user’s real location and k- 1 dummy locations, and P is the original query predicate that applies to all k-locations. We call query Q0 a location privacy query, since it hides the user location.

4) Trajectory Privacy Preserving Framework: This technique proposes the use of Mix Zone Graph Model where mix zone is applied over a single sensitive location. Pseudonyms of the participators are changed in this mix zone in order to protect the trajectories of the user’s which can be inferred by an adversary. Directed Weight Graph of mix zone model is created where an adversary cannot map an exact relationship between participator’s arrival time and their exit time. This technique works well but considers only single sensitive location where mix zone graph model is applied. C. Comparison of Existing Techniques with Proposed System: Several work exists where location of the users’ as well as their trajectories are given privacy. Dummy location [7] is a mechanism of creating fake alias location of the user’s

B. Trajectory Privacy Protection

85

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 5, May 2015

end users or the data collectors. Fig.1 shows the overall architecture of TrPF system.

location in order to confuse the adversary. Location k anonymity is defined in [8] as a privacy approach designed to protect identification of an individual against a specific datasets. Another technique used for location privacy is obfuscation [9] where the user’s location is purposefully altered to lower the precision of the user’s spatial temporal information. This can be achieved using generalization or perturbation. Pseudonym [10] is a randomly generated unique identifier provided to each user before entering the sensitive area called as mix zones [11]. Mix zone is the area where a participators movement cannot be tracked by anyone. Pseudonym is generated to break any link present between the user’s identity and their events. Mix networks [12] are used to anonymize the channels used between the links between the reports submitted by the user to the system. It is been observed that once a user’s trajectory has been identified, then it becomes easy to derive the locations of the users.

Fig. 1. Architecture Of TrPF System Trajectory privacy schemes exist in the literature. Some of them are as follows - dummy trajectories [13] where fake user location trajectories of the users are created. This technique provides privacy to the trajectories however the main problem is how to generate the exact look alike fake trajectories. Another technique proposed is suppression based [14] technique where the whole trajectories are generally suppressed with the assumption that the adversary would not be able to infer the user’s information since the whole trajectories are not exposed. The main threat to this approach is that essential data may get lost during the process of suppression. Trajectory k-anonymization [15] technique proposes a scheme where every trajectory is generated such that a user finds it indistinguishable to guess the other k-1 trajectories. All these techniques deal with the whole trajectory and thus increases the storage space cost. Not all locations are sensitive, so providing privacy around these sensitive locations can only be considered instead of whole trajectories [16]. To overcome the defects above, a new scheme has been proposed to preserve the privacy of the trajectories at multiple sensitive locations. III.

In this approach the trajectories of the participators are preserved using Mix Zone Graph Model. Not all, but only sensitive trajectories are considered for while applying mix zone graph model. Firstly, a sensitive location, o, is taken as centre and a sensitive area is constructed around it. The trajectories intersecting the sensitive area are said to be as sensitive trajectory segments. Mix zone graph model is then applied on these segments. Thus, the trajectories of the participators are preserved. A. Limitations  Only single sensitive location is considered.  Requires more time to process query as only raw trajectories are considered. IV. PROPOSED SYSTEM A. Architecture The existing solution considers only a single sensitive location while constructing mix zone graph model. This leads to the lack of a systematic approach for global privacy protection. Henceforth to overcome this drawback, the proposed system defines multiple sensitive locations around which multiple mix zone graph model will be applied. Not all point of interests can be considered as the candidates for applying mix zone graph model. The main reason for this the available cost constraints which eventually limits the number of mix zones that one could deploy. So the problem is to address the multiple mix zone graph model’s placement. This is an optimization problem.

EXISTING SYSTEM

Most of the existing techniques focus on providing location privacy of the participators while few approaches consider preserving the trajectories of the user. An approach called as Trajectory Privacy Preserving Framework TrPF for participatory sensing applications has been proposed. The participators known as data collector sense the spatialtemporal information through their mobile device. This information is stored by the Report Server which generates data reports that are eventually stored on Application Server. Any authorized end user or participator can view these reports. Trusted third party severs are used for maintaining security to

The proposed system can be explained as follows which is shown in Fig.2 – Firstly, the data collectors sense and provide their spatial temporal information to the Server using their

86

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 5, May 2015

mobile phones. Consider a participator provide their current location(x,y) using GPS embedded in mobile phones. As the participator moves his/her locations get stored on the server, eventually forming location traces i.e trajectories. These trajectories must be preserved from an adversary in order to the preserve the privacy of the participators. Mix Zone Graph Model technique has been used for providing privacy to the participator. In proposed system we consider multiple locations as the candidates for applying Mix Zone Graph Model. Due to cost constraints, not all locations can be considered as point of interests where the model can be applied. Hence selection and placement of multiple locations to be considered for applying Mix Zone Graph Model is the problem to be addressed whose solution is given next. After receiving multiple locations as an output of Multiple Mix Zone Placement Model, Mix Zone Graph Model is applied at all these locations. Meanwhile, an end user may query on this data store on the server and server may provide appropriate result.

approach first finds the points (vertices), whose removal makes the graph disconnected. Such points are called as articulation points. This partitions the graph into disconnected components thus eliminating the need of pair wise connections between them. To refine the quality of solution further, the set of independent vertices are found. These are the vertices that are not adjacent to each other. Finally, the number of mix zones are limited by the given cost constraint. Consider the following Graph G = (V,E) where vertices V represents Points Of Interests of a participator and E represents the road segments connecting POIs. The first step is built on the observation that partitioning G into several disconnected components is helpful to eliminate the pairwise connections across these components. Therefore, we are seeking for vertices whose removal disconnect the graph. Such vertices are typically referred to as articulation points in graph theory. Take the area graph in Figure 3 as an example. Any route from 1 to 9 or from 1 to 12 needs to go through vertices 6 and 10. Therefore, 6 and 10 are articulation points in this graph. If a mix zone is deployed at vertex 6 or 10, a pseudonym appears at any vertex in the bottom part of the graph cannot appear at vertices 9, 12, and 11. Hence, the total number of pairwise associations is reduced.

Fig 2. Proposed System Architecture For instance, consider a scenario of Online Car Booking System where end users i.e the customers at any time can book a car online through the system. The administrator depending on the availability of the drivers assigns a driver to the customer. The customer at any time can track their assigned driver. Considering the privacy of the driver, not all location trajectories of the driver should be visible to the customer. The driver who is the participator in this system provide their locations to the administrator using their mobile phones. Trajectories of driver’s are stored on the server which can be viewed by the administrator and driver itself. No the other party should be able to view the whole trajectory of a driver. Hence, Mix Zone Graph Model is applied at multiple sensitive locations of the driver thereby not allowing the customer to view the whole trajectory of a driver. The sensitive locations of the driver like his house, hospital, gym, work place, etc. must not be able to be known by the customer or an adversary. Applying Mix Zone Graph Model at multiple locations prevents an adversary or an end user from inferring the whole trajectory of the participator. Thus the trajectory privacy of the participatory sensing user is preserved.

Fig.3 Point of Interests Graph After G is partitioned into disconnected components, the mix zone deployment in each component is further refined to improve the solution quality. In graph theory, an independent set refers to a set of vertices that are not adjacent to each other. Hence, if all vertices that are not in an independent set are selected as mix zones, there will be no pair wise association between the vertices in the independent set. Again, refer to the bottom part of Figure 3 as an example. Circle highlighted vertices, {1, 8, 3, 5}, form a maximal independent set for the lower part of the graph. If vertices {2, 4, 6, 7} are selected as mix zones, a user Alice’s pseudonym ux appears at vertex 1 will not appear at any other vertex in the independent set. As a result, Alice’s past and future locations on her trajectory are protected, even though her identity gets exposed at vertex 1. Finally, there is a need to control the number of mix zones to meet the cost and service constraint. At the last step of our algorithm, we iteratively remove the vertex that introduces the

B. Solution - Multiple Mix Zone Placement Model This approach generally determines the number of positions where Mix Zone Graph model has to be applied. Basically this

87

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 5, May 2015

least number of pair wise association increment from the mix zone candidate set selected by previous steps until cost constraint is met.

D. Algorithms Used 1) GraphConstruct Algorithm This algorithm is used to construct mix zone graph model which is represented by a graph G(V,E). A mix zone graph model has been proposed such that Directed Weight Graph (DWG) is represented by G = (V, E) , where, V represents set of vertices that are constructed as the pseudonyms. E represents set of edges that represent the participators’ trajectory mapping from the ingress to the egress in the sensitive area.

C. Mathematical Model Let S = {I, P ,O} I = Input O = Output P = Process. I= {SI, GQ} SI = Sense Information GQ= Generate Query

Algorithm1 GraphConstruct

P = {TR, MMPM, MZGM} TR = Generate trajectories. MMPM = Determine multiple locations. MZGM = Apply Mix Zone Graph Model.

Input

:- Trajectory Tr and pseudonym set P.

Output :-Directed Weight Graph (G). 1 : Procedure 2: Define sensitive location and construct sensitive area around it such that Si = {o, r} where o is sensitive location and r is the radius. 3: Determine the set of sensitive trajectory segments Tf. 4: Randomly select ingress pseudonym Pi and assign it to the vertex Vi. 5: Randomly select egress pseudonym Pj such that Pj ≠ Pi and assign it to the vertex Vj. 6: Construct Edge Eij such that Eij -> (Vi,Vj) 7: Assign weight Wij to each edges using Weight Construct algorithm.

O = {PR} PR = Provide results of the generated queries. Fig. 4 represents the mathematical model of overall proposed system.

2) Algorithm 2:- Weight Construct This algorithm is used to find weights of the edges formed in the graph of the mix zone graph model. Here, Vi represents participator entering the mix zone. K represents total number of participators entering mix zone. Pi represents ingress pseudonym of a participator. Pj represents egress pseudonym of a participator. tingress(Vi) represents time at which participator enters the mix zone. tj to tj+1 represents time interval during which participator exists from the system. P(Vi,t) represents the probability that a single participator exits the mix zones between time interval[tj,tj+1]. The participator Vi generally takes tj –tingress(Vi) to tj+1 – tingress(Vi) time in mix-zone for data collection. ∆' t represents data collection time in mix zone. is the probability density function (PDF) of data collection time in mix-zones.

Fig.4. Mathematical Model L: UM: AM: SI : GQ: TR: MZGM: MMPM: PR :

Login into the system. Access to the User Module. Access to the Administrator Module. Sense the Information Generate Queries. Generate trajectories. Generate Trajectory Mix Zone Graph Model. Generate Multiple Mix Zone Placement Model. Provide Results to the user.

Therefore, P(Vi, t) =

88

(1)

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 5, May 2015

Output:- A set of at most NP selected mix zone positions

The above mentioned equation represents probability of a single participator exiting from the mix zone. Thus, the probability for all the participators exiting from the mix zone is given by (2) P(V', t) represents the probability that all participator exits from the mix zone between time interval[tj,tj+1]. P(V' , t) =

1: Procedure 2: Find articulation points in the given graph. 3: Find maximal independent set. 4: Maintain Cost Constraint.

(2)

V . EVALUATION AND RESULTS Here, the real time data is taken as an input for the system. As explained prior, the participator is providing their location (x , y) and timestamp ( t) to the Server using the GPS of their mobile phones. The trajectories are stored in the form of (tid, x, y ,t ) on the server where tid represents the trajectory ID. Sensitive locations are considered around which Mix Zone Graph Model is applied. Meanwhile the end user can access the relevant data on the server . The Online Vehicle Booking System is built as an website using C# ASP.Net whereas the participator provides its spatial temporal data to the Server using Android mobile devices. Participator side module is developed using Android Programming in Java.

However only one of them is a real participator. Hence, the probability that the participator Vi exits in the time interval [tj,tj+1] is denoted by P(Vi [tj ,tj+1]) is given by the following conditional probabilityP(Vi [tj ,tj+1]) =

(3)

Wij is given by Wij= P(Vi [tj ,tj+1]) such that wij is between 0 to 1 and i [1,k] and (4) The Weight Construct algorithm is given as follows:-

This work aims in proving that the privacy level of a participator can be enhanced by applying Mix Zone Graph Model at multiple sensitive locations instead on single sensitive location. This can be proved by measuring the rate of successful attacks on single mix zone as compared to multiple mix zones. An attack is successful if the adversary finds out the corresponding pseudonym used by a user in the side information. The success rate of an adversary is the ratio of number of successful attacks over total number of attacks. Fig.5 shows the attack success rate when different number of mix zones is applied where X axis represents number of mix zones to be deployed at various sensitive locations and Y axis represents the rate of successful attack.

Algorithm 2 WeightConstruct Input :- tingress and ∆tegress=[ tj,tj+1] and ∆' t Output:- Edge Weight W 1: Procedure 2: Determine the probability P(Vi,t) of single participator exiting mix zone in given time interval. 3: Determine the probability P(Vi',t) for all participator exiting mix zone in given time interval. 4: Find the probability of a single participator exiting the mix zone model denoted by P(Vi [tj ,tj+1]) 5: Assign P(Vi [tj ,tj+1]) as the weight of the edge.

3) Algorithm 3:- Multiple Mix Zone Placement Model. This algorithm generally determines the number of positions where mix zone graph model has to be applied. Basically this algorithm first finds the points (vertices), whose removal makes the graph disconnected. Such points are called as articulation points. This partitions the graph into disconnected components thus eliminating the need of pair wise connections between them. To refine the quality of solution further, the set of independent vertices are found. These are the vertices that are not adjacent to each other. Finally, the number of mix zones are limited by the given cost constraint.

Fig.5. Comparison of Privacy Level The above graph shows that the rate of successful attack is high when number of mix zones is less. It shows that as the number of mix zones increases eventually the rate of successful attack decreases thereby improving the level of privacy. The reason for this is on increase in number of mix

Algorithm 3 Multiple Mix Zone Placement Model. Input :- A graph G and Z.

89

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 5, May 2015 [3] X. Liu, H. Zhao,M. Pan, H. Yue, X. Li, and Y. Fang, ”Traffic-aware multiple mix zone placement for protecting location privacy,” in Proc. IEEE INFOCOM, 2012, pp. 972-980. [4] M. Duckham and L. Kulik, “A formal model of obfuscation and negotiation for location privacy,” in Proc. 3rd Int. Conf. Pervasive Computing (PERVASIVE’05), 2005, pp. 152–170. [5] H. Lu, C. S. Jensen, andM. L. Yiu, “Pad: Privacy-area aware, dummy based location privacy in mobile services,” in Proc. 7th ACM Int.Workshop on Data Engineering for Wireless and Mobile Access, 2008, pp. 16–23, ACM. [6] M. E. Nergiz, M. Atzori, and Y. Saygin, “Towards trajectory anonymization: A generalization-based approach,” in Proc. ACM SIGSPATIAL ACM GIS 2008 Int. Workshop on Security and Privacy in GIS and LBS, 2008, pp. 52–61. [7] H. Kido, Y. Yanagisawa, and T. Satoh, ”An anonymous communication technique using dummies for location-based services,” in Proc.Int. Conf. Pervasive Services, 2005, pp. 88-97. [8] L. Sweeney, ”k-anonymity: Amodel for protecting privacy,” Int. J. Uncertainty Fuzziness and Knowl. Based Syst., vol. 10, no. 5, pp. 557570,2002. [9] M. Duckham and L. Kulik, ”A formalmodel of obfuscation and negotiation for location privacy,” in Proc. 3rd Int. Conf. Pervasive Computing(PERVASIVE’05), 2005, pp. 152-170. [10] J. Freudiger, M. H. Manshaei, J. Y. Le Boudec, and J. P. Hubaux, ”On the age of pseudonyms in mobile ad hoc networks,” in Proc. IEEEINFOCOM, 2010, pp. 1-9. [11] J. Freudiger, M. Raya, M. Flegyhzi, P. Papadimitratos, and J. P. Hubaux, ”Mix-zones for location privacy in vehicular networks,” in Proc. 1st Int. Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS 07), Vancouver, BC, Canada, 2007. [12] A. Kapadia, N. Triandopoulos, C. Cornelius, D. Peebles, and D. Kotz, ”Anonysense: Opportunistic and privacypreserving contextcollection,” Pervasive Comput., vol. 5013, pp. 280-297, 2008. [13] T. H. You, W. C. Peng, and W. C. Lee, ”Protecting moving trajectories with dummies,” in Proc. IEEE Int. Conf. Mobile Data Management,2007, pp. 278-282. [14] M. Terrovitis and N. Mamoulis, ”Privacy preservation in the publication of trajectories,” in Proc. IEEE 9th Int. Conf. Mobile Data Management (MDM’08), 2008, pp. 65-72. [15] M. E. Nergiz, M. Atzori, and Y. Saygin, ”Towards trajectory anonymization: A generalization-based approach,” in Proc. ACM SIGSPATIAL ACM GIS 2008 Int. Workshop on Security and Privacy in GIS and LBS, 2008, pp. 52-61. [16] A. T. Palma, V. Bogorny, B. Kuijpers, and L. O. Alvares, ”A clusteringbased approach for discovering interesting places in trajectories,” in Proc. 2008 ACM Symp. Applied Computing 2008, pp. 863-868, ACM.

zones successful attack rate decreases because the adversary has to crack the corresponding number of pseudonyms in order to deduce the whole trajectory. This becomes sustainably simpler for an adversary with single mix zone as only one pseudonym has to be cracked. So as the number of locations where mix zone graph model has to be applied increases, the privacy preservation of trajectories increases. Thus, the proposed scheme offers better privacy as compared to the existing systems. Another advantage of the proposed work is that it requires less storage space as compared to the existing techniques. Previous work like Dummy trajectories and trajectory k-anonymity stored all trajectories for providing protection. Given t trajectories and each trajectory contains N segments then the storage space required will be O( N* t ) to store total t trajectories. Whereas trajectory mix zone graph model approach requires only pseudonym to be stored. Only sensitive trajectory segments are considered here and not all trajectories. Hence storage space required for this approach is quite less as compared to the previous work. Further, the increase of trajectories may not affect the number of pseudonyms too much. By comparison, our proposal has lesser storage memory than that of the other proposals.

VI. CONCLUSION AND FUTURE WORK Participatory sensing leverages the ubiquity of mobile phones to open new perspectives in terms of sensing. The analysis has revealed that virtually all applications capture location and time information. The collected data is been stored in form of the trajectories. The privacy of these trajectories needs to be preserved. Trajectory Mix zone Graph model is been used here for providing privacy to the trajectories of the participators’. This approach proposes multiple sensitive locations to be considered for applying Mix Zone Graph Model as opposed to single sensitive location. The results proves that applying mix zone graph model at multiple sensitive locations as compared to single sensitive location increases the privacy level of the participator. Hence the proposed system provides better results as compared to the existing techniques in terms of increased privacy level and reduced storage space. In future, mix zone graph model can be applied on multiple sensitive locations of semantic trajectories. ACKNOWLEDGMENT The authors appreciate the helpful comments and suggestions from the anonymous reviews. REFERENCES [1] T. Campbell, S. B. Eisenman, N. D. Lane, E. Miluzzo, and R. A.Peterson, ”People-centric urban sensing,” in Proc. 2nd Ann. Int. Workshopon Wireless Internet, 2006, p. 18, ACM. [2] Sheng Gao, Jianfeng Ma, Weisong Shi, Senior Member, IEEE, Guoxing Zhan, and Cong Sun, ”TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing” IEEE transactions on Information Forensics and security, vol. 8, no. 6, June 2013.

90

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Lihat lebih banyak...

Comentários

Copyright © 2017 DADOSPDF Inc.